Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vccg-f4gp-45x9

Опубликовано: 21 нояб. 2023
Источник: github
Github: Прошло ревью
CVSS3: 8.4

Описание

Eval Injection in fastbots

Impact

An attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function def locator(self, locator_name: str) in page.py. The vulnerable code that load and execute directly from the file without validation it's:

return eval(self._bot.locator(self._page_name, locator_name))

Patches

In order to mitigate this issue it's important to upgrade to fastbots version 0.1.5 or above.

References

Merge that fix also this issue

Пакеты

Наименование

fastbots

pip
Затронутые версииВерсия исправления

< 0.1.5

0.1.5

EPSS

Процентиль: 70%
0.00642
Низкий

8.4 High

CVSS3

Дефекты

CWE-94
CWE-95

Связанные уязвимости

CVSS3: 8.4
nvd
около 2 лет назад

fastbots is a library for fast bot and scraper development using selenium and the Page Object Model (POM) design. Prior to version 0.1.5, an attacker could modify the locators.ini locator file with python code that without proper validation it's executed and it could lead to rce. The vulnerability is in the function `def __locator__(self, locator_name: str)` in `page.py`. In order to mitigate this issue, upgrade to fastbots version 0.1.5 or above.

EPSS

Процентиль: 70%
0.00642
Низкий

8.4 High

CVSS3

Дефекты

CWE-94
CWE-95